• Title/Summary/Keyword: Security Search

Search Result 524, Processing Time 0.028 seconds

An XML Access Control Method through Filtering XPath Expressions (XPath 표현식의 필터링을 통한 XML 접근 제어 기법)

  • Jeon Jae-myeong;Chung Yon Dohn;Kim Myoung Ho;Lee Yoon Joon
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.193-203
    • /
    • 2005
  • XML (extensible Markup Language) is recognized as a standard of data representation and transmission on Internet. XPath is a standard for specifying parts of XML documents anda suitable language for both query processing and access control of XML. In this paper, we use the XPath expression for representing user queries and access control for XML. And we propose an access control method for XML, where we control accesses to XML documents by filtering query XPath expressions through access control XPath expressions. In the proposed method, we directly search XACT (XML Access Control Tree) for a query XPath expression and extract the access-granted parts. The XACT is our proposedstructure, where the edges are structural summary of XML elements and the nodes contain access-control information. We show the query XPath expressions are successfully filtered through the XACT by our proposed method, and also show the performance improvement by comparing the proposed method with the previous work.

Real-Time Ransomware Infection Detection System Based on Social Big Data Mining (소셜 빅데이터 마이닝 기반 실시간 랜섬웨어 전파 감지 시스템)

  • Kim, Mihui;Yun, Junhyeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.10
    • /
    • pp.251-258
    • /
    • 2018
  • Ransomware, a malicious software that requires a ransom by encrypting a file, is becoming more threatening with its rapid propagation and intelligence. Rapid detection and risk analysis are required, but real-time analysis and reporting are lacking. In this paper, we propose a ransomware infection detection system using social big data mining technology to enable real-time analysis. The system analyzes the twitter stream in real time and crawls tweets with keywords related to ransomware. It also extracts keywords related to ransomware by crawling the news server through the news feed parser and extracts news or statistical data on the servers of the security company or search engine. The collected data is analyzed by data mining algorithms. By comparing the number of related tweets, google trends (statistical information), and articles related wannacry and locky ransomware infection spreading in 2017, we show that our system has the possibility of ransomware infection detection using tweets. Moreover, the performance of proposed system is shown through entropy and chi-square analysis.

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일용 고화질 영상 전송 인터페이스의 설계 및 구현)

  • Ahn, Yong-Beom;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1511-1518
    • /
    • 2007
  • As studies on ubiquitous computing are actively conducted, desire for various services, including image transmission storage, search and remote monitoring. has been expanding into mobile environment as well as to PCs. while CCTV (closed circuit TV) and un DVR (Digital video Recording) are used in places where security service such as intrusion detection system is required, these are high-end equipment. So it is not easy for ordinary users or household and small-sized companies to use them. Besides, they are difficult to be carried and camera solution for mobile device does not support high-quality function and provides low-definition of QVGA for picture quality. Therefore, in this study, design and implementation of embedded system of high-definition image transmission for ubiquitous mobile device which is not inferior to PC or DVR are described. To this end, usage of dedicated CPU for mobile device and design and implementation of MPEG-4 H/W CODEC also are examined. The implemented system showed excellent performance in mobile environment, in terms of speed, picture quality.

Simulation of Evacuation Route Scenarios Through Multicriteria Analysis for Rescue Activities

  • Castillo Osorio, Ever Enrique;Yoo, Hwan Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.5
    • /
    • pp.303-313
    • /
    • 2019
  • After a disaster happens in urban areas, many people need support for a quick evacuation. This work aims to develop a method for the calculation of the most feasible evacuation route inside buildings. In the methodology we simplify the geometry of the structural and non structural elements from the BIM (Building Information Modeling) to store them in a spatial database which follows standards to support vector data. Then, we apply the multicriteria analysis with the allocation of prioritization values and weight factors validated through the AHP (Analytic Hierarchy Process), in order to obtain the Importance Index S(n) of the elements. The criteria consider security conditions and distribution of the building's facilities. The S(n) is included as additional heuristic data for the calculation of the evacuation route through an algorithm developed as a variant of the $A^*$ pathfinding, The experimental results in the simulation of evacuation scenarios for vulnerable people in healthy physical conditions and for the elderly group, shown that the conditions about the wide of routes, restricted areas, vulnerable elements, floor roughness and location of facilities in the building applied in the multicriteria analysis has a high influence on the processing of the developed variant of $A^*$ algorithm. The criteria modify the evacuation route, because they considers as the most feasible route, the safest instead of the shortest, for the simulation of evacuation scenarios for people in healthy physical conditions. Likewise, they consider the route with the location of facilities for the movement of the elderly like the most feasible in the simulation of evacuation route for the transit of the elderly group. These results are important for the assessment of the decision makers to select between the shortest or safest route like the feasible for search and rescue activities.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification (공격 메일 식별을 위한 비정형 데이터를 사용한 유전자 알고리즘 기반의 특징선택 알고리즘)

  • Hong, Sung-Sam;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Since big-data text mining extracts many features and data, clustering and classification can result in high computational complexity and low reliability of the analysis results. In particular, a term document matrix obtained through text mining represents term-document features, but produces a sparse matrix. We designed an advanced genetic algorithm (GA) to extract features in text mining for detection model. Term frequency inverse document frequency (TF-IDF) is used to reflect the document-term relationships in feature extraction. Through a repetitive process, a predetermined number of features are selected. And, we used the sparsity score to improve the performance of detection model. If a spam mail data set has the high sparsity, detection model have low performance and is difficult to search the optimization detection model. In addition, we find a low sparsity model that have also high TF-IDF score by using s(F) where the numerator in fitness function. We also verified its performance by applying the proposed algorithm to text classification. As a result, we have found that our algorithm shows higher performance (speed and accuracy) in attack mail classification.

Case Study on the Building Organization of Medibio Research Laboratory Facilities in Research-driven Hospital (연구중심병원 의생명연구원의 실험실 구성 사례 조사)

  • Kim, Young-Aee
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.95-104
    • /
    • 2018
  • Healthcare technology has been growing and fostering cooperation between industry, university and hospitals as growth engines in korea. So, the medibio research institutes in hospital have been constructed to promote research and industrialization centering on healthcare technology. The purpose of this study is to investigate the cases of research institutes in hospitals, and search the characteristics of building organization of medibio research laboratory facilities. Case study is investigated by floor plan, homepage and site visits about five research institutes selected in research-driven hospitals. The facility title and size of research laboratory is originated from site area and research building location. The building function include not only the research lab and business office reflecting on the development platform, and but assembly and meeting room in the ground level. Laboratory floor plans have three types, rectangular, rectangular+linear and linear type, one is traditional and efficient, the others are people and friendly. And building core types are correlated with lab space unit modules, single and double side core are shown in rectangular type. All the laboratories are open lab, composed with laboratory bench and research note writing desk facing the lab service and enclosed lab-support area. And they have communication space looking as warm and cozy common area for the innovation, convergence and collaboration. As the high risk of contamination and high standard for safety and security, equipment and facilities are well managed with biological environment including BSC, fume hood, PCR classification, eye washing and emergency shower.

Transnational Labor Migration in Southeast Asia and Regional Governance: In Search of Good Governance (동남아시아의 이주노동과 지역 거버넌스)

  • Choi, Horim
    • The Southeast Asian review
    • /
    • v.20 no.2
    • /
    • pp.135-178
    • /
    • 2010
  • This study is to seek alternatives for regional governance related to transnational labor migration issues in Southeast Asia. This study examined the present situation and trends of labor migration in the region, reviewed involved transnational issues, and identified the current issues of governance to seek alternatives for regional governance. The increase in cross-border labor migration is no doubt a sign of growth and dynamism of the region and greater integration of their economies. But it also poses complex policy and management issues as well as transnational issues over such as unequal economic profits, illegal migration, human rights, and social security issues. In this reality, regional governance is a very important theme and the efforts to manage their migration inherently involve fundamental conflict and tension between related countries and regions. However, politics and governance of transnational migrant workers in Southeast Asia are still pursued at the national level. To resolve these issues, it is urgently required to secure not only collaboration between the parties concerned but also governance at the regional level. Findings of this study are: First, although labor migration has been a relatively long-time transnational issue, the history of addressing the issue at the regional governance is very short and still inceptive. Second, given its size, labor migration in Southeast Asia requires effective regional governance but no breakthrough was possible due to the conflict of interests between origin and destination countries and the conflict of logic between the labor market and the state. Third, the issue of labor migration is an important element for the formation of economic and socio-cultural communities the ASEAN countries have pursued. Fourth, it is urgently needed to seek alternatives for good and effective regional governance as a key to resolving these issues over migrant workers in Southeast Asia.

Development of a Portable Detection System for Simultaneous Measurements of Neutrons and Gamma Rays (중성자선과 감마선 동시측정이 가능한 휴대용 계측시스템 개발에 관한 연구)

  • Kim, Hui-Gyeong;Hong, Yong-Ho;Jung, Young-Seok;Kim, Jae-Hyun;Park, Sooyeun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.481-487
    • /
    • 2020
  • Radiation measurement technology has steadily improved and its usage is expanding in various industries such as nuclear medicine, security search, satellite, nondestructive testing, environmental industries and the domain of nuclear power plants (NPPs). Especially, the simultaneous measurements of gamma rays and neutrons can be even more critical for nuclear safety management of spent nuclear fuel and monitoring of the nuclear material. A semiconductor detector comprising cadmium, zinc, and tellurium (CZT) enables to detect gamma-rays due to the significant atomic weight of the elements via immediate neutron and gamma-ray detection. Semiconductor sensors might be used for nuclear safety management by monitoring nuclear materials and spent nuclear fuel with high spatial resolution as well as providing real-time measurements. We aim to introduce a portable nuclide-analysis device that enables the simultaneous measurements of neutrons and gamma rays using a CZT sensor. The detector has a high density and wide energy band gap, and thus exhibits highly sensitive physical characteristics and characteristics are required for performing neutron and gamma-ray detection. Portable nuclide-analysis device is used on NPP-decommissioning sites or the purpose of nuclear nonproliferation, it will rapidly detect the nuclear material and provide radioactive-material information. Eventually, portable nuclide-analysis device can reduce measurement time and economic costs by providing a basis for rational decision making.